fbpx
Wikipedia

Cryptocurrency wallet

A cryptocurrency wallet is a device,[1] physical medium,[2] program or an online service which stores the public and/or private keys[3] for cryptocurrency transactions. In addition to this basic function of storing the keys, a cryptocurrency wallet more often offers the functionality of encrypting and/or signing information.[4] Signing can for example result in executing a smart contract, a cryptocurrency transaction (see "bitcoin transaction" image), identification, or legally signing a 'document' (see "application form" image).[5]

An example paper printable bitcoin wallet consisting of one bitcoin address for receiving and the corresponding private key for spending

History

In 2008 bitcoin was introduced as the first cryptocurrency following the principle outlined by Satoshi Nakamoto in the paper “Bitcoin: A Peer-to-Peer Electronic Cash System.”[6] The project was described as an electronic payment system using cryptographic proof instead of trust. It also mentioned using cryptographic proof to verify and record transactions on a blockchain.[7][8]

Starting in 2022, Forbes reported 60 large crypto exchanges trading above USD 100 billion.[9]

In March 2022, approximately 600 crypto exchanges globally facilitated digital asset trading, including Binance, Coinbase, Crypto.com, Gemini, GMO Coin, Huobi, eToro, Kraken, Robinhood.[9][4] Aside from cryptocurrency exchanges, consumers had an option to utilize cryptocurrency wallets such as Ledger, Trezor, MetaMask and others for the secure storage and management of digital assets.

Software wallets

The first wallet program, simply named Bitcoin, and sometimes referred to as the Satoshi client, was released in 2009 by Satoshi Nakamoto as open-source software.[10] In version 0.5 the client moved from the wxWidgets user interface toolkit to Qt, and the whole bundle was referred to as Bitcoin-Qt.[11] After the release of version 0.9, the software bundle was renamed Bitcoin Core to distinguish itself from the underlying network.[12][13] Bitcoin Core is, perhaps, the best known implementation or client. Forks of Bitcoin Core exist, such as Bitcoin XT, Bitcoin Unlimited,[14] and Parity Bitcoin.[15]

There are several modes in which wallets can operate. They have an inverse relationship with regard to trustlessness and computational requirements.[citation needed]

  • Full clients verify transactions directly by downloading a full copy of the blockchain (over 150 GB as of January 2018).[citation needed] They do not require trust in any external parties. Full clients check the validity of mined blocks, preventing them from transacting on a chain that breaks or alters network rules.[16]: ch. 1  Because of its size and complexity, downloading and verifying the entire blockchain is not suitable for all computing devices.[citation needed]
  • Lightweight clients consult full nodes to send and receive transactions without requiring a local copy of the entire blockchain (see simplified payment verificationSPV). This makes lightweight clients much faster to set up and allows them to be used on low-power, low-bandwidth devices such as smartphones. When using a lightweight wallet, however, the user must trust full nodes, as it can report faulty values back to the user. Lightweight clients follow the longest blockchain and do not ensure it is valid, requiring trust in full nodes.[17]

Third-party internet services called online wallets or webwallets offer similar functionality but may be easier to use. In this case, credentials to access funds are stored with the online wallet provider rather than on the user's hardware.[18] As a result, the user must have complete trust in the online wallet provider. A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen. An example of such a security breach occurred with Mt. Gox in 2011.[19]

Cold storage

 
A paper wallet with a banknote-like design. Both the private key and the address are visible in text form and as 2D barcodes.
 
A paper wallet with the address visible for adding or checking stored funds. The part of the page containing the private key is folded over and sealed.
 
A brass token with a private key hidden beneath a tamper-evident security hologram. A part of the address is visible through a transparent part of the hologram.
 
A hardware wallet peripheral which processes bitcoin payments without exposing any credentials to the computer

Wallet software is targeted by hackers because of the lucrative potential for stealing bitcoins.[20] "Cold storage" simply means keeping the private keys out of reach of hackers by storing or generating them on a device that is not connected to the internet.[21][16]: ch. 4 [22]: 39  The credentials necessary to spend bitcoins can be stored offline in a number of different ways, from simple paper printouts of private keys, to specialized hardware wallets.[16]: ch. 10 

Paper wallets

A paper wallet is created with a keypair generated on a computer with no internet connection; the private key is written or printed onto the paper and then erased from the computer.[16]: ch. 4  The paper wallet can then be stored in a safe physical location for later retrieval.[22]: 39 

Physical wallets can also take the form of metal token coins[23] with a private key accessible under a security hologram in a recess struck on the reverse side.[24]: 38  The security hologram self-destructs when removed from the token, showing that the private key has been accessed.[25] Originally, these tokens were struck in brass and other base metals, but later used precious metals as bitcoin grew in value and popularity.[24]: 80  Coins with stored face value as high as ₿1,000 have been struck in gold.[24]: 102–104  The British Museum's coin collection includes four specimens from the earliest series[24]: 83  of funded bitcoin tokens; one is currently on display in the museum's money gallery.[26] In 2013, a Utah manufacturer of these tokens was ordered by the Financial Crimes Enforcement Network (FinCEN) to register as a money services business before producing any more funded bitcoin tokens.[23][24]: 80 

Hardware wallets

A hardware wallet is a computer peripheral that signs transactions as requested by the user. These devices store private keys and carry out signing and encryption internally,[21] and do not share any sensitive information with the host computer except already signed (and thus unalterable) transactions.[27] Because hardware wallets never expose their private keys, even computers that may be compromised by malware do not have a vector to access or steal them.[22]: 42–45 The user sets a passcode when setting up a hardware wallet.[21] As hardware wallets are tamper-resistant,[27][16]: ch. 10  without the passcode the assets cannot be accessed.[27]

Technology

Private and public key generation

A cryptocurrency wallet works by a theoretical or random number being generated and used with a length that depends on the algorithm size of the cryptocurrency's technology requirements. The number is converted to a private key using the specific requirements of the cryptocurrency cryptography algorithm requirement. A public key is then generated from the private key using whichever cryptographic algorithm is required. The private key is used by the owner to access and send cryptocurrency and is private to the owner, whereas the public key is to be shared to any third party to receive cryptocurrency.[28]

Up to this stage no computer or electronic device is required and all key pairs can be mathematically derived and written down by hand. The private key and public key pair (known as an address) are not known by the blockchain or anyone else. The blockchain will only record the transaction of the public address when cryptocurrency is sent to it, thus recording in the blockchain ledger the transaction of the public address.[4]

Duplicate private keys

Collision (two or more wallets having the same private key) is theoretically possible, since keys can be generated without being used for transactions, and are therefore offline until recorded in the blockchain ledger. However, this possibility is effectively negated because the theoretical probability of two or more private keys being the same is extremely low. The number of possible wallets and thus private keys is extremely high,[4][29][30] so duplicating or hacking a certain key would be inconceivable.[31][32]

Seed phrases

In modern convention a seed phrase is now utilised which is a random 12 to 24 (or even greater) list of dictionary words which is an unencrypted form of the private key. (Words are easier to memorize than numerals). When online, exchange and hardware wallets are generated using random numbers, and the user is asked to supply a seed phrase. If the wallet is misplaced, damaged or compromised, the seed phrase can be used to re-access the wallet and associated keys and cryptocurrency in toto.[33]

Wallets

A number of technologies known as wallets exist that store the key value pair of private and public key known as wallets. A wallet hosts the details of the key pair making cryptocurrency transactions possible. Multiple methods exist for storing keys or seeds in a wallet.[34]

A brainwallet or brain wallet is a type of wallet in which one memorizes a passcode (a private key or seed phrase).[35][36] Brainwallets may be attractive due to plausible deniability or protection against governmental seizure,[37] but are vulnerable to password guessing (especially large-scale offline guessing).[35][37] Several hundred brainwallets exist on the Bitcoin blockchain, but most of them have been drained, sometimes repeatedly.[35]

Crypto wallets vis-à-vis DApp browsers

DApp browsers are specialized software that supports decentralized applications. DApp browsers are considered to be the browsers of Web3 and are the gateway to access the decentralized applications which are based on blockchain technology. That means all DApp browsers must have a unique code system to unify all the different codes of the DApps.

While crypto wallets are focused on the exchange, purchase, sale of digital assets and support narrowly targeted applications, the browsers support different kinds of applications of various formats, including exchange, games, NFTs marketplaces, etc.

Characteristics

In addition to the basic function of storing the keys, a cryptocurrency wallet may also have one or more of the following characteristics.

Simple cryptocurrency wallet

 
An actual bitcoin transaction from a web based cryptocurrency exchange to a hardware cryptocurrency wallet

A simple cryptocurrency wallet contains pairs of public and private cryptographic keys. The keys can be used to track ownership, receipt or spend cryptocurrencies.[38] A public key allows others to make payments to the address derived from it, whereas a private key enables the spending of cryptocurrency from that address.[39]

The cryptocurrency itself is not in the wallet. In the case of bitcoin and cryptocurrencies derived from it, the cryptocurrency is decentrally stored and maintained in a publicly available distributed ledger called the blockchain.[38]

eID wallet

 
Providing an eID and a diploma and digitally signing the 'application form' with a crypto wallet app

Some wallets are specifically designed to be compatible with a framework. The European Union is creating an eIDAS compatible European Self-Sovereign Identity Framework (ESSIF) which runs on the European Blockchain Services Infrastructure (EBSI). The EBSI wallet is designed to (securely) provide information, an eID and to sign 'transactions'.[5]

Multisignature wallet

In contrast to simple cryptocurrency wallets requiring just one party to sign a transaction, multi-sig wallets require multiple parties to sign a transaction.[40] Multisignature wallets are designed for increased security.[41] Usually, a multisignature algorithm produces a joint signature that is more compact than a collection of distinct signatures from all users.[42]

Smart contract

In the cryptocurrency space, smart contracts are digitally signed in the same way a cryptocurrency transaction is signed. The signing keys are held in a cryptocurrency wallet.

Key derivation

Sequential deterministic wallet

 
A deterministic wallet seed phrase of a crypto wallet

A sequential deterministic wallet utilizes a simple method of generating addresses from a known starting string or "seed". This would utilize a cryptographic hash function, e.g. SHA-256 (seed + n), where n is an ASCII-coded number that starts from 1 and increments as additional keys are needed.[43]

Hierarchical deterministic wallet

The hierarchical deterministic (HD) wallet was publicly described in BIP32.[44] As a deterministic wallet, it also derives keys from a single master root seed, but instead of having a single "chain" of keypairs, an HD wallet supports multiple key pair chains.

This allows a single key string to be used to generate an entire tree of key pairs with a stratified structure.[45]

BIP39 proposed the use of a set of human-readable words to derive the master private key of a wallet.[citation needed] This mnemonic phrase allows for easier wallet backup and recovery, due to all the keys of a wallet being derivable from a single plaintext string.[how?]

Non-deterministic wallet

In a non-deterministic wallet, each key is randomly generated on its own accord, and they are not seeded from a common key. Therefore, any backups of the wallet must store each and every single private key used as an address, as well as a buffer of 100 or so future keys that may have already been given out as addresses but not received payments yet.[46][38]: 94 

Concerns

When choosing a wallet, the owner must keep in mind who is supposed to have access to (a copy of) the private keys and thus potentially has signing capabilities. In case of cryptocurrency the user needs to trust the provider to keep the cryptocurrency safe, just like with a bank. Trust was misplaced in the case of the Mt. Gox exchange, which 'lost' most of their clients' bitcoins. Downloading a cryptocurrency wallet from a wallet provider to a computer or phone does not automatically mean that the owner is the only one who has a copy of the private keys.[citation needed]

A wallet can also have known or unknown vulnerabilities. A supply chain attack or side-channel attack are ways of introducing vulnerabilities. In extreme cases even a computer which is not connected to any network can be hacked.[47]

To mitigate the risk of crypto wallet hacking, one can choose for a cold wallet, which remains offline and disconnected from the internet. A cold wallet refers to a physical device, such as a pen drive, that is utilized as a secure storage medium for transferring money from a hot wallet.[48]

Security

Digital wallets provide similar security and benefits as traditional currency. When using a digital wallet, consumers don't need to fill out order forms on each site because their information is stored and automatically updated and inserted into merchant sites' order fields. Electronic wallets safeguard consumers' data with a private software code, while retailers get fraud protection, faster payment acceptance, lower transaction costs, and less theft loss.[49]

Digital wallets are free and simple to get. When using a merchant site that accepts server-side digital wallets, customers enter their name, payment, and delivery information. Following the purchase, the customer is requested to register for a wallet with a user name and password for future purchases. Sites selling wallets can also be visited.[citation needed]

Digital wallets can be dedicated to a single cryptocurrency (examples: Bitcoin, Etherium, Ripple, Litecoin), or they can be multi-currency (Coinomi, CoinSpot, CoinVault, Cryptonator multi-cryptocurrency wallet, Exodus, Gatehub, Holy Transaction, Jaxx Wallet, UberPay Wallet, AnCrypto Wallet.

Wallets are free for consumers but cost retailers. Wallet sellers may receive a portion of merchant purchases made through their wallets. In other circumstances, digital wallet vendors conduct cardholder-merchant transactions for a set fee.[50][49]

See also

References

  1. ^ Roberts, Daniel (15 December 2017). "How to send bitcoin to a hardware wallet". Yahoo! Finance.
  2. ^ Divine, John (1 February 2019). "What's the Best Bitcoin Wallet?". U.S. News & World Report. Retrieved 12 March 2019.
  3. ^ Newman, Lily Hay (2017-11-05). "How to Keep Your Bitcoin Safe and Secure". Wired. ISSN 1059-1028. Retrieved 2019-03-10.
  4. ^ a b c d Levine, Matt. "The Crypto Story". Bloomberg.com. Retrieved 2023-12-03.
  5. ^ a b "European Blockchain Services Infrastructure (EBSI)". 2020-12-31. from the original on 2022-10-19.
  6. ^ Nakamoto, Satoshi. "Bitcoin: A Peer-to-Peer Electronic Cash System" (PDF).
  7. ^ "What are blockchain and cryptocurrency?", Blockchain and Cryptocurrency: International Legal and Regulatory Challenges, Bloomsbury Professional, 2022, doi:10.5040/9781526521682.chapter-002, ISBN 978-1-5265-2165-1, retrieved 2023-02-26
  8. ^ "Soon You'll Be Saying, 'There's a Blockchain App for That'". Bloomberg.com. 2021-11-16. Retrieved 2023-12-03.
  9. ^ a b Paz, Javier. "The Best Global Crypto Exchanges". Forbes. Retrieved 2023-12-03.
  10. ^ Davis, Joshua (10 October 2011). "The Crypto-Currency: Bitcoin and its mysterious inventor". The New Yorker. from the original on 1 November 2014. Retrieved 31 October 2014.
  11. ^ Skudnov, Rostislav (2012). Bitcoin Clients (PDF) (Bachelor's Thesis). Turku University of Applied Sciences. (PDF) from the original on 18 January 2014. Retrieved 16 January 2014.
  12. ^ "Bitcoin Core version 0.9.0 released". bitcoin.org. from the original on 27 February 2015. Retrieved 8 January 2015.
  13. ^ Metz, Cade (19 August 2015). "The Bitcoin Schism Shows the Genius of Open Source". Wired. Condé Nast. from the original on 30 June 2016. Retrieved 3 July 2016.
  14. ^ Vigna, Paul (17 January 2016). "Is Bitcoin Breaking Up?". The Wall Street Journal. from the original on 20 August 2016. Retrieved 8 November 2016.
  15. ^ Allison, Ian (28 April 2017). "Ethereum co-founder Dr Gavin Wood and company release Parity Bitcoin". International Business Times. from the original on 28 April 2017. Retrieved 28 April 2017.
  16. ^ a b c d e Antonopoulos, Andreas M. (2014). Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O'Reilly Media. ISBN 978-1-4493-7404-4.
  17. ^ Gervais, Arthur; O. Karame, Ghassan; Gruber, Damian; Capkun, Srdjan. "On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients" (PDF). (PDF) from the original on 5 October 2016. Retrieved 3 September 2016.
  18. ^ Bill Barhydt (4 June 2014). "3 reasons Wall Street can't stay away from bitcoin". NBCUniversal. from the original on 3 April 2015. Retrieved 2 April 2015.
  19. ^ "MtGox gives bankruptcy details". bbc.com. BBC. 4 March 2014. from the original on 12 March 2014. Retrieved 13 March 2014.
  20. ^ Jeffries, Adrianne (19 December 2013). "How to steal Bitcoin in three easy steps". The Verge. from the original on 27 July 2019. Retrieved 17 January 2014.
  21. ^ a b c Roberts, Daniel (15 December 2017). "How to send bitcoin to a hardware wallet". Yahoo Finance. from the original on 17 February 2018. Retrieved 17 February 2018.
  22. ^ a b c Barski, Conrad; Wilmer, Chris (2015). Bitcoin for the Befuddled. No Starch Press. ISBN 978-1-59327-573-0.
  23. ^ a b Staff, Verge (13 December 2013). "Casascius, maker of shiny physical bitcoins, shut down by Treasury Department". The Verge. from the original on 10 January 2014. Retrieved 10 January 2014.
  24. ^ a b c d e Ahonen, Elias; Rippon, Matthew J.; Kesselman, Howard (2016). Encyclopedia of Physical Bitcoins and Crypto-Currencies. Elias Ahonen. ISBN 978-0-9950-8990-7.
  25. ^ Mack, Eric (25 October 2011). "Are physical Bitcoins legal?". CNET. from the original on 26 June 2019. Retrieved 19 May 2019.
  26. ^ British Museum (2012). "Bitcoin token with digital code for bitcoin currency". Retrieved 17 May 2019.
  27. ^ a b c Arapinis, Myrto; Gkaniatsou, Adriana; Karakostas, Dimitris; Kiayias, Aggelos (2019). A Formal Treatment of Hardware Wallets (PDF) (Technical report). University of Edinburgh, IOHK.
  28. ^ Baloian, Artiom (2021-12-18). "How To Generate Public and Private Keys for the Blockchain". Medium. Retrieved 2023-09-27.
  29. ^ Singer, David; Singer, Ari (2018). "Big Numbers: The Role Played by Mathematics in Internet Commerce" (PDF).
  30. ^ Kraft, James S. (2018). An introduction to number theory with cryptography. Lawrence C. Washington (2nd ed.). Boca Raton, FL. ISBN 978-1-315-16100-6. OCLC 1023861398.{{cite book}}: CS1 maint: location missing publisher (link)
  31. ^ Yadav, Nagendra Singh & Goar, Vishal & Kuri, Manoj. (2020). Crypto Wallet: A Perfect Combination with Blockchain and Security Solution for Banking. International Journal of Psychosocial Rehabilitation. 24. 6056-6066. 10.37200/IJPR/V24I2/PR2021078.
  32. ^ Guler, Sevil (2015). "Secure Bitcoin Wallet" (PDF). UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Science Computer Science Curriculum: 48 – via core.ac.uk.
  33. ^ Shaik, Cheman. (2020). Securing Cryptocurrency Wallet Seed Phrase Digitally with Blind Key Encryption. International Journal on Cryptography and Information Security. 10. 1-10. 10.5121/ijcis.2020.10401.
  34. ^ Jokić, Stevo & Cvetković, Aleksandar Sandro & Adamović, Saša & Ristić, Nenad & Spalević, Petar. (2019). Comparative analysis of cryptocurrency wallets vs traditional wallets. Ekonomika. 65. 10.5937/ekonomika1903065J.
  35. ^ a b c Vasek, Marie; Bonneau, Joseph; Castellucci, Ryan; Keith, Cameron; Moore, Tyler (2017). "The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets". In Grossklags, Jens; Preneel, Bart (eds.). Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 9603. Berlin, Heidelberg: Springer. pp. 609–618. doi:10.1007/978-3-662-54970-4_36. ISBN 978-3-662-54970-4.
  36. ^ Kent, Peter; Bain, Tyler (2022). Bitcoin For Dummies. John Wiley & Sons. p. 102. ISBN 978-1-119-60213-2.
  37. ^ a b Castellucci, Ryan. "Cracking Cryptocurrency Brainwallets" (PDF). rya.nc. (PDF) from the original on 8 November 2020. Retrieved 28 December 2022.
  38. ^ a b c Antonopoulos, Andreas (12 July 2017). Mastering Bitcoin: Programming the Open Blockchain. O'Reilly Media, Inc. ISBN 9781491954386. Retrieved 14 September 2017.
  39. ^ "Bitcoin Wallets: What You Need to Know About the Hardware". The Daily Dot. 2018-11-20. Retrieved 2019-03-10.
  40. ^ . Fortune. Archived from the original on 2020-12-04. Retrieved 2019-02-15.
  41. ^ Graham, Luke (2017-07-20). "$32 million worth of digital currency ether stolen by hackers". www.cnbc.com. Retrieved 2019-02-15.
  42. ^ Bellare, Mihir; Neven, Gregory (2006). "Identity-Based Multi-signatures from RSA". Topics in Cryptology – CT-RSA 2007. Lecture Notes in Computer Science. Vol. 4377. pp. 145–162. CiteSeerX 10.1.1.207.2329. doi:10.1007/11967668_10. ISBN 978-3-540-69327-7. {{cite book}}: |journal= ignored (help)
  43. ^ Oranburg, Seth C., ed. (2022), "Cryptographic Theory and Decentralized Finance", A History of Financial Technology and Regulation: From American Incorporation to Cryptocurrency and Crowdfunding, Cambridge: Cambridge University Press, pp. 112–128, doi:10.1017/9781316597736.010, ISBN 978-1-107-15340-0, retrieved 2023-02-26
  44. ^ "Bip32". University of Texas at Austin. Retrieved 17 October 2021.
  45. ^ Gutoski, Gus; Stebila, Douglas. "Hierarchical deterministic Bitcoin wallets that tolerate key leakage" (PDF). iacr.org. International Association for Cryptologic Research. Retrieved 2 November 2018.
  46. ^ Acharya, Vivek (30 June 2021). "How Ethereum Non-Deterministic and Deterministic Wallets Work". Oracle Corporation. Retrieved 17 October 2021.
  47. ^ . Archived from the original on 2019-08-19. Retrieved 2018-10-17.
  48. ^ Sigalos, MacKenzie (2022-11-12). "FTX says it's removing trading and withdrawals, moving digital assets to a cold wallet after a $477 million suspected hack". CNBC. Retrieved 2023-12-03.
  49. ^ a b Katz, Ariel. "Council Post: The Digital Payment Boom: How We Can Uphold Safe Online Commerce". Forbes. Retrieved 2023-12-03.
  50. ^ Vittorio, Andrea. "Virtual Green Cards Offer Path for Digital Wallets' Data Privacy". news.bloomberglaw.com. Retrieved 2023-12-03.

cryptocurrency, wallet, this, article, multiple, issues, please, help, improve, discuss, these, issues, talk, page, learn, when, remove, these, template, messages, some, this, article, listed, sources, reliable, please, help, improve, this, article, looking, b. This article has multiple issues Please help improve it or discuss these issues on the talk page Learn how and when to remove these template messages Some of this article s listed sources may not be reliable Please help improve this article by looking for better more reliable sources Unreliable citations may be challenged and removed January 2023 Learn how and when to remove this message This article relies excessively on references to primary sources Please improve this article by adding secondary or tertiary sources Find sources Cryptocurrency wallet news newspapers books scholar JSTOR January 2023 Learn how and when to remove this message Learn how and when to remove this message A cryptocurrency wallet is a device 1 physical medium 2 program or an online service which stores the public and or private keys 3 for cryptocurrency transactions In addition to this basic function of storing the keys a cryptocurrency wallet more often offers the functionality of encrypting and or signing information 4 Signing can for example result in executing a smart contract a cryptocurrency transaction see bitcoin transaction image identification or legally signing a document see application form image 5 An example paper printable bitcoin wallet consisting of one bitcoin address for receiving and the corresponding private key for spending Contents 1 History 1 1 Software wallets 1 2 Cold storage 1 2 1 Paper wallets 1 2 2 Hardware wallets 2 Technology 2 1 Private and public key generation 2 2 Duplicate private keys 2 3 Seed phrases 2 4 Wallets 2 5 Crypto wallets vis a vis DApp browsers 3 Characteristics 3 1 Simple cryptocurrency wallet 3 2 eID wallet 3 3 Multisignature wallet 3 4 Smart contract 3 5 Key derivation 3 5 1 Sequential deterministic wallet 3 5 2 Hierarchical deterministic wallet 3 5 3 Non deterministic wallet 4 Concerns 5 Security 6 See also 7 ReferencesHistoryIn 2008 bitcoin was introduced as the first cryptocurrency following the principle outlined by Satoshi Nakamoto in the paper Bitcoin A Peer to Peer Electronic Cash System 6 The project was described as an electronic payment system using cryptographic proof instead of trust It also mentioned using cryptographic proof to verify and record transactions on a blockchain 7 8 Starting in 2022 Forbes reported 60 large crypto exchanges trading above USD 100 billion 9 In March 2022 approximately 600 crypto exchanges globally facilitated digital asset trading including Binance Coinbase Crypto com Gemini GMO Coin Huobi eToro Kraken Robinhood 9 4 Aside from cryptocurrency exchanges consumers had an option to utilize cryptocurrency wallets such as Ledger Trezor MetaMask and others for the secure storage and management of digital assets Software wallets The first wallet program simply named Bitcoin and sometimes referred to as the Satoshi client was released in 2009 by Satoshi Nakamoto as open source software 10 In version 0 5 the client moved from the wxWidgets user interface toolkit to Qt and the whole bundle was referred to as Bitcoin Qt 11 After the release of version 0 9 the software bundle was renamed Bitcoin Core to distinguish itself from the underlying network 12 13 Bitcoin Core is perhaps the best known implementation or client Forks of Bitcoin Core exist such as Bitcoin XT Bitcoin Unlimited 14 and Parity Bitcoin 15 There are several modes in which wallets can operate They have an inverse relationship with regard to trustlessness and computational requirements citation needed Full clients verify transactions directly by downloading a full copy of the blockchain over 150 GB as of January 2018 update citation needed They do not require trust in any external parties Full clients check the validity of mined blocks preventing them from transacting on a chain that breaks or alters network rules 16 ch 1 Because of its size and complexity downloading and verifying the entire blockchain is not suitable for all computing devices citation needed Lightweight clients consult full nodes to send and receive transactions without requiring a local copy of the entire blockchain see simplified payment verification SPV This makes lightweight clients much faster to set up and allows them to be used on low power low bandwidth devices such as smartphones When using a lightweight wallet however the user must trust full nodes as it can report faulty values back to the user Lightweight clients follow the longest blockchain and do not ensure it is valid requiring trust in full nodes 17 Third party internet services called online wallets or webwallets offer similar functionality but may be easier to use In this case credentials to access funds are stored with the online wallet provider rather than on the user s hardware 18 As a result the user must have complete trust in the online wallet provider A malicious provider or a breach in server security may cause entrusted bitcoins to be stolen An example of such a security breach occurred with Mt Gox in 2011 19 Cold storage nbsp A paper wallet with a banknote like design Both the private key and the address are visible in text form and as 2D barcodes nbsp A paper wallet with the address visible for adding or checking stored funds The part of the page containing the private key is folded over and sealed nbsp A brass token with a private key hidden beneath a tamper evident security hologram A part of the address is visible through a transparent part of the hologram nbsp A hardware wallet peripheral which processes bitcoin payments without exposing any credentials to the computer Wallet software is targeted by hackers because of the lucrative potential for stealing bitcoins 20 Cold storage simply means keeping the private keys out of reach of hackers by storing or generating them on a device that is not connected to the internet 21 16 ch 4 22 39 The credentials necessary to spend bitcoins can be stored offline in a number of different ways from simple paper printouts of private keys to specialized hardware wallets 16 ch 10 Paper wallets A paper wallet is created with a keypair generated on a computer with no internet connection the private key is written or printed onto the paper and then erased from the computer 16 ch 4 The paper wallet can then be stored in a safe physical location for later retrieval 22 39 Physical wallets can also take the form of metal token coins 23 with a private key accessible under a security hologram in a recess struck on the reverse side 24 38 The security hologram self destructs when removed from the token showing that the private key has been accessed 25 Originally these tokens were struck in brass and other base metals but later used precious metals as bitcoin grew in value and popularity 24 80 Coins with stored face value as high as 1 000 have been struck in gold 24 102 104 The British Museum s coin collection includes four specimens from the earliest series 24 83 of funded bitcoin tokens one is currently on display in the museum s money gallery 26 In 2013 a Utah manufacturer of these tokens was ordered by the Financial Crimes Enforcement Network FinCEN to register as a money services business before producing any more funded bitcoin tokens 23 24 80 Hardware wallets A hardware wallet is a computer peripheral that signs transactions as requested by the user These devices store private keys and carry out signing and encryption internally 21 and do not share any sensitive information with the host computer except already signed and thus unalterable transactions 27 Because hardware wallets never expose their private keys even computers that may be compromised by malware do not have a vector to access or steal them 22 42 45 The user sets a passcode when setting up a hardware wallet 21 As hardware wallets are tamper resistant 27 16 ch 10 without the passcode the assets cannot be accessed 27 TechnologyPrivate and public key generation A cryptocurrency wallet works by a theoretical or random number being generated and used with a length that depends on the algorithm size of the cryptocurrency s technology requirements The number is converted to a private key using the specific requirements of the cryptocurrency cryptography algorithm requirement A public key is then generated from the private key using whichever cryptographic algorithm is required The private key is used by the owner to access and send cryptocurrency and is private to the owner whereas the public key is to be shared to any third party to receive cryptocurrency 28 Up to this stage no computer or electronic device is required and all key pairs can be mathematically derived and written down by hand The private key and public key pair known as an address are not known by the blockchain or anyone else The blockchain will only record the transaction of the public address when cryptocurrency is sent to it thus recording in the blockchain ledger the transaction of the public address 4 Duplicate private keys Collision two or more wallets having the same private key is theoretically possible since keys can be generated without being used for transactions and are therefore offline until recorded in the blockchain ledger However this possibility is effectively negated because the theoretical probability of two or more private keys being the same is extremely low The number of possible wallets and thus private keys is extremely high 4 29 30 so duplicating or hacking a certain key would be inconceivable 31 32 Seed phrases In modern convention a seed phrase is now utilised which is a random 12 to 24 or even greater list of dictionary words which is an unencrypted form of the private key Words are easier to memorize than numerals When online exchange and hardware wallets are generated using random numbers and the user is asked to supply a seed phrase If the wallet is misplaced damaged or compromised the seed phrase can be used to re access the wallet and associated keys and cryptocurrency in toto 33 Wallets A number of technologies known as wallets exist that store the key value pair of private and public key known as wallets A wallet hosts the details of the key pair making cryptocurrency transactions possible Multiple methods exist for storing keys or seeds in a wallet 34 A brainwallet or brain wallet is a type of wallet in which one memorizes a passcode a private key or seed phrase 35 36 Brainwallets may be attractive due to plausible deniability or protection against governmental seizure 37 but are vulnerable to password guessing especially large scale offline guessing 35 37 Several hundred brainwallets exist on the Bitcoin blockchain but most of them have been drained sometimes repeatedly 35 Crypto wallets vis a vis DApp browsers DApp browsers are specialized software that supports decentralized applications DApp browsers are considered to be the browsers of Web3 and are the gateway to access the decentralized applications which are based on blockchain technology That means all DApp browsers must have a unique code system to unify all the different codes of the DApps While crypto wallets are focused on the exchange purchase sale of digital assets and support narrowly targeted applications the browsers support different kinds of applications of various formats including exchange games NFTs marketplaces etc CharacteristicsIn addition to the basic function of storing the keys a cryptocurrency wallet may also have one or more of the following characteristics Simple cryptocurrency wallet nbsp An actual bitcoin transaction from a web based cryptocurrency exchange to a hardware cryptocurrency wallet A simple cryptocurrency wallet contains pairs of public and private cryptographic keys The keys can be used to track ownership receipt or spend cryptocurrencies 38 A public key allows others to make payments to the address derived from it whereas a private key enables the spending of cryptocurrency from that address 39 The cryptocurrency itself is not in the wallet In the case of bitcoin and cryptocurrencies derived from it the cryptocurrency is decentrally stored and maintained in a publicly available distributed ledger called the blockchain 38 eID wallet nbsp Providing an eID and a diploma and digitally signing the application form with a crypto wallet app Some wallets are specifically designed to be compatible with a framework The European Union is creating an eIDAS compatible European Self Sovereign Identity Framework ESSIF which runs on the European Blockchain Services Infrastructure EBSI The EBSI wallet is designed to securely provide information an eID and to sign transactions 5 Multisignature wallet In contrast to simple cryptocurrency wallets requiring just one party to sign a transaction multi sig wallets require multiple parties to sign a transaction 40 Multisignature wallets are designed for increased security 41 Usually a multisignature algorithm produces a joint signature that is more compact than a collection of distinct signatures from all users 42 Smart contract In the cryptocurrency space smart contracts are digitally signed in the same way a cryptocurrency transaction is signed The signing keys are held in a cryptocurrency wallet Key derivation Sequential deterministic wallet nbsp A deterministic wallet seed phrase of a crypto wallet A sequential deterministic wallet utilizes a simple method of generating addresses from a known starting string or seed This would utilize a cryptographic hash function e g SHA 256 seed n where n is an ASCII coded number that starts from 1 and increments as additional keys are needed 43 Hierarchical deterministic wallet The hierarchical deterministic HD wallet was publicly described in BIP32 44 As a deterministic wallet it also derives keys from a single master root seed but instead of having a single chain of keypairs an HD wallet supports multiple key pair chains This allows a single key string to be used to generate an entire tree of key pairs with a stratified structure 45 BIP39 proposed the use of a set of human readable words to derive the master private key of a wallet citation needed This mnemonic phrase allows for easier wallet backup and recovery due to all the keys of a wallet being derivable from a single plaintext string how Non deterministic wallet In a non deterministic wallet each key is randomly generated on its own accord and they are not seeded from a common key Therefore any backups of the wallet must store each and every single private key used as an address as well as a buffer of 100 or so future keys that may have already been given out as addresses but not received payments yet 46 38 94 ConcernsWhen choosing a wallet the owner must keep in mind who is supposed to have access to a copy of the private keys and thus potentially has signing capabilities In case of cryptocurrency the user needs to trust the provider to keep the cryptocurrency safe just like with a bank Trust was misplaced in the case of the Mt Gox exchange which lost most of their clients bitcoins Downloading a cryptocurrency wallet from a wallet provider to a computer or phone does not automatically mean that the owner is the only one who has a copy of the private keys citation needed A wallet can also have known or unknown vulnerabilities A supply chain attack or side channel attack are ways of introducing vulnerabilities In extreme cases even a computer which is not connected to any network can be hacked 47 To mitigate the risk of crypto wallet hacking one can choose for a cold wallet which remains offline and disconnected from the internet A cold wallet refers to a physical device such as a pen drive that is utilized as a secure storage medium for transferring money from a hot wallet 48 SecurityDigital wallets provide similar security and benefits as traditional currency When using a digital wallet consumers don t need to fill out order forms on each site because their information is stored and automatically updated and inserted into merchant sites order fields Electronic wallets safeguard consumers data with a private software code while retailers get fraud protection faster payment acceptance lower transaction costs and less theft loss 49 Digital wallets are free and simple to get When using a merchant site that accepts server side digital wallets customers enter their name payment and delivery information Following the purchase the customer is requested to register for a wallet with a user name and password for future purchases Sites selling wallets can also be visited citation needed Digital wallets can be dedicated to a single cryptocurrency examples Bitcoin Etherium Ripple Litecoin or they can be multi currency Coinomi CoinSpot CoinVault Cryptonator multi cryptocurrency wallet Exodus Gatehub Holy Transaction Jaxx Wallet UberPay Wallet AnCrypto Wallet Wallets are free for consumers but cost retailers Wallet sellers may receive a portion of merchant purchases made through their wallets In other circumstances digital wallet vendors conduct cardholder merchant transactions for a set fee 50 49 See alsoCryptocurrency Cryptocurrency exchange Bitcoin List of bitcoin companies Cryptography Cryptocurrency and security Medium of exchange Private and Public key cryptography Mobile payment Digital gold currencyReferences Roberts Daniel 15 December 2017 How to send bitcoin to a hardware wallet Yahoo Finance Divine John 1 February 2019 What s the Best Bitcoin Wallet U S News amp World Report Retrieved 12 March 2019 Newman Lily Hay 2017 11 05 How to Keep Your Bitcoin Safe and Secure Wired ISSN 1059 1028 Retrieved 2019 03 10 a b c d Levine Matt The Crypto Story Bloomberg com Retrieved 2023 12 03 a b European Blockchain Services Infrastructure EBSI 2020 12 31 Archived from the original on 2022 10 19 Nakamoto Satoshi Bitcoin A Peer to Peer Electronic Cash System PDF What are blockchain and cryptocurrency Blockchain and Cryptocurrency International Legal and Regulatory Challenges Bloomsbury Professional 2022 doi 10 5040 9781526521682 chapter 002 ISBN 978 1 5265 2165 1 retrieved 2023 02 26 Soon You ll Be Saying There s a Blockchain App for That Bloomberg com 2021 11 16 Retrieved 2023 12 03 a b Paz Javier The Best Global Crypto Exchanges Forbes Retrieved 2023 12 03 Davis Joshua 10 October 2011 The Crypto Currency Bitcoin and its mysterious inventor The New Yorker Archived from the original on 1 November 2014 Retrieved 31 October 2014 Skudnov Rostislav 2012 Bitcoin Clients PDF Bachelor s Thesis Turku University of Applied Sciences Archived PDF from the original on 18 January 2014 Retrieved 16 January 2014 Bitcoin Core version 0 9 0 released bitcoin org Archived from the original on 27 February 2015 Retrieved 8 January 2015 Metz Cade 19 August 2015 The Bitcoin Schism Shows the Genius of Open Source Wired Conde Nast Archived from the original on 30 June 2016 Retrieved 3 July 2016 Vigna Paul 17 January 2016 Is Bitcoin Breaking Up The Wall Street Journal Archived from the original on 20 August 2016 Retrieved 8 November 2016 Allison Ian 28 April 2017 Ethereum co founder Dr Gavin Wood and company release Parity Bitcoin International Business Times Archived from the original on 28 April 2017 Retrieved 28 April 2017 a b c d e Antonopoulos Andreas M 2014 Mastering Bitcoin Unlocking Digital Crypto Currencies O Reilly Media ISBN 978 1 4493 7404 4 Gervais Arthur O Karame Ghassan Gruber Damian Capkun Srdjan On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients PDF Archived PDF from the original on 5 October 2016 Retrieved 3 September 2016 Bill Barhydt 4 June 2014 3 reasons Wall Street can t stay away from bitcoin NBCUniversal Archived from the original on 3 April 2015 Retrieved 2 April 2015 MtGox gives bankruptcy details bbc com BBC 4 March 2014 Archived from the original on 12 March 2014 Retrieved 13 March 2014 Jeffries Adrianne 19 December 2013 How to steal Bitcoin in three easy steps The Verge Archived from the original on 27 July 2019 Retrieved 17 January 2014 a b c Roberts Daniel 15 December 2017 How to send bitcoin to a hardware wallet Yahoo Finance Archived from the original on 17 February 2018 Retrieved 17 February 2018 a b c Barski Conrad Wilmer Chris 2015 Bitcoin for the Befuddled No Starch Press ISBN 978 1 59327 573 0 a b Staff Verge 13 December 2013 Casascius maker of shiny physical bitcoins shut down by Treasury Department The Verge Archived from the original on 10 January 2014 Retrieved 10 January 2014 a b c d e Ahonen Elias Rippon Matthew J Kesselman Howard 2016 Encyclopedia of Physical Bitcoins and Crypto Currencies Elias Ahonen ISBN 978 0 9950 8990 7 Mack Eric 25 October 2011 Are physical Bitcoins legal CNET Archived from the original on 26 June 2019 Retrieved 19 May 2019 British Museum 2012 Bitcoin token with digital code for bitcoin currency Retrieved 17 May 2019 a b c Arapinis Myrto Gkaniatsou Adriana Karakostas Dimitris Kiayias Aggelos 2019 A Formal Treatment of Hardware Wallets PDF Technical report University of Edinburgh IOHK Baloian Artiom 2021 12 18 How To Generate Public and Private Keys for the Blockchain Medium Retrieved 2023 09 27 Singer David Singer Ari 2018 Big Numbers The Role Played by Mathematics in Internet Commerce PDF Kraft James S 2018 An introduction to number theory with cryptography Lawrence C Washington 2nd ed Boca Raton FL ISBN 978 1 315 16100 6 OCLC 1023861398 a href Template Cite book html title Template Cite book cite book a CS1 maint location missing publisher link Yadav Nagendra Singh amp Goar Vishal amp Kuri Manoj 2020 Crypto Wallet A Perfect Combination with Blockchain and Security Solution for Banking International Journal of Psychosocial Rehabilitation 24 6056 6066 10 37200 IJPR V24I2 PR2021078 Guler Sevil 2015 Secure Bitcoin Wallet PDF UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Science Computer Science Curriculum 48 via core ac uk Shaik Cheman 2020 Securing Cryptocurrency Wallet Seed Phrase Digitally with Blind Key Encryption International Journal on Cryptography and Information Security 10 1 10 10 5121 ijcis 2020 10401 Jokic Stevo amp Cvetkovic Aleksandar Sandro amp Adamovic Sasa amp Ristic Nenad amp Spalevic Petar 2019 Comparative analysis of cryptocurrency wallets vs traditional wallets Ekonomika 65 10 5937 ekonomika1903065J a b c Vasek Marie Bonneau Joseph Castellucci Ryan Keith Cameron Moore Tyler 2017 The Bitcoin Brain Drain Examining the Use and Abuse of Bitcoin Brain Wallets In Grossklags Jens Preneel Bart eds Financial Cryptography and Data Security Lecture Notes in Computer Science Vol 9603 Berlin Heidelberg Springer pp 609 618 doi 10 1007 978 3 662 54970 4 36 ISBN 978 3 662 54970 4 Kent Peter Bain Tyler 2022 Bitcoin For Dummies John Wiley amp Sons p 102 ISBN 978 1 119 60213 2 a b Castellucci Ryan Cracking Cryptocurrency Brainwallets PDF rya nc Archived PDF from the original on 8 November 2020 Retrieved 28 December 2022 a b c Antonopoulos Andreas 12 July 2017 Mastering Bitcoin Programming the Open Blockchain O Reilly Media Inc ISBN 9781491954386 Retrieved 14 September 2017 Bitcoin Wallets What You Need to Know About the Hardware The Daily Dot 2018 11 20 Retrieved 2019 03 10 Bitcoin Startup Predicts Cryptocurrency Market Will Grow By 100 Billion in 2018 Fortune Archived from the original on 2020 12 04 Retrieved 2019 02 15 Graham Luke 2017 07 20 32 million worth of digital currency ether stolen by hackers www cnbc com Retrieved 2019 02 15 Bellare Mihir Neven Gregory 2006 Identity Based Multi signatures from RSA Topics in Cryptology CT RSA 2007 Lecture Notes in Computer Science Vol 4377 pp 145 162 CiteSeerX 10 1 1 207 2329 doi 10 1007 11967668 10 ISBN 978 3 540 69327 7 a href Template Cite book html title Template Cite book cite book a journal ignored help Oranburg Seth C ed 2022 Cryptographic Theory and Decentralized Finance A History of Financial Technology and Regulation From American Incorporation to Cryptocurrency and Crowdfunding Cambridge Cambridge University Press pp 112 128 doi 10 1017 9781316597736 010 ISBN 978 1 107 15340 0 retrieved 2023 02 26 Bip32 University of Texas at Austin Retrieved 17 October 2021 Gutoski Gus Stebila Douglas Hierarchical deterministic Bitcoin wallets that tolerate key leakage PDF iacr org International Association for Cryptologic Research Retrieved 2 November 2018 Acharya Vivek 30 June 2021 How Ethereum Non Deterministic and Deterministic Wallets Work Oracle Corporation Retrieved 17 October 2021 Air gap jumpers on cyber bgu ac il Archived from the original on 2019 08 19 Retrieved 2018 10 17 Sigalos MacKenzie 2022 11 12 FTX says it s removing trading and withdrawals moving digital assets to a cold wallet after a 477 million suspected hack CNBC Retrieved 2023 12 03 a b Katz Ariel Council Post The Digital Payment Boom How We Can Uphold Safe Online Commerce Forbes Retrieved 2023 12 03 Vittorio Andrea Virtual Green Cards Offer Path for Digital Wallets Data Privacy news bloomberglaw com Retrieved 2023 12 03 Portals nbsp Internet nbsp Economics nbsp Money nbsp Free and open source software nbsp Numismatics Retrieved from https en wikipedia org w index php title Cryptocurrency wallet amp oldid 1219152065, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.